/haiku-buildtools/gcc/libsanitizer/asan/ |
H A D | asan_poisoning.h | 20 // Poisons the shadow memory for "size" bytes starting from "addr". 23 // Poisons the shadow memory for "redzone_size" bytes starting from 40 // for mapping shadow and zeroing out pages doesn't "just work", so we should 71 u8 *shadow = (u8*)MEM_TO_SHADOW(aligned_addr); local 72 for (uptr i = 0; i < redzone_size; i += SHADOW_GRANULARITY, shadow++) { 74 *shadow = 0; // fully addressable 76 *shadow = (SHADOW_GRANULARITY == 128) ? 0xff : value; // unaddressable 79 *shadow = poison_partial ? static_cast<u8>(size - i) : 0;
|
H A D | asan_mapping.h | 20 // Typical shadow mapping on Linux/x86_64 with SHADOW_OFFSET == 0x00007fff8000: 128 #define SHADOW_TO_MEM(shadow) (((shadow) - SHADOW_OFFSET) << SHADOW_SCALE) 144 // With the zero shadow base we can not actually map pages starting from 0. 166 // If 1, all shadow boundaries are constants. 239 // In zero-based shadow mode we treat addresses near zero as addresses 240 // in shadow gap as well.
|
H A D | asan_fake_stack.cc | 26 u64 *shadow = reinterpret_cast<u64*>(MemToShadow(ptr)); local 29 shadow[i] = magic;
|
H A D | asan_allocator2.cc | 42 // Mark the corresponding shadow memory as not needed. 363 u8 *shadow = (u8*)MemToShadow(user_beg + size_rounded_down_to_granularity); local 364 *shadow = fl.poison_partial ? (size & (SHADOW_GRANULARITY - 1)) : 0;
|
/haiku-buildtools/gcc/gcc/testsuite/g++.dg/cpp1y/ |
H A D | lambda-generic-udt.C | 11 S (S&& old) { old.shadow = true; i += 2; } 12 ~S () { if (shadow) i -= 2; else --i; } 14 bool shadow = false; member in struct:S
|
/haiku-buildtools/gcc/libsanitizer/tsan/ |
H A D | tsan_platform_mac.cc | 57 uptr shadow = (uptr)MmapFixedNoReserve(kShadowBeg, local 59 if (shadow != kShadowBeg) { 60 Printf("FATAL: ThreadSanitizer can not mmap the shadow memory\n");
|
H A D | tsan_platform_linux.cc | 110 "RSS %zd MB: shadow:%zd meta:%zd file:%zd mmap:%zd" 172 // Mark shadow for .rodata sections with the special kShadowRodata marker. 207 // Map the file into shadow of .rodata sections. 230 // Map memory shadow. 231 uptr shadow = (uptr)MmapFixedNoReserve(kShadowBeg, local 233 if (shadow != kShadowBeg) { 234 Printf("FATAL: ThreadSanitizer can not mmap the shadow memory\n"); 236 "to link with -pie (%p, %p).\n", shadow, kShadowBeg); 247 DPrintf("memory shadow: %zx-%zx (%zuGB)\n", 251 // Map meta shadow [all...] |
/haiku-buildtools/gcc/gcc/testsuite/g++.dg/debug/ |
H A D | namespace1.C | 140 int shadow = 12; member in namespace:C 179 int shadow = 13; member in namespace:C::D 205 shadow;
|
/haiku-buildtools/gcc/libsanitizer/include/sanitizer/ |
H A D | msan_interface.h | 44 void __msan_partial_poison(const volatile void *data, void *shadow, 71 /* Print shadow and origin for the memory range to stderr in a human-readable 75 /* Print shadow for the memory range to stderr in a minimalistic
|
/haiku-buildtools/legacy/gcc/gcc/config/alpha/ |
H A D | alpha.c | 4353 as possible. In this context, a trap shadow is the sequence of 4360 (a) On entry to the trap shadow, if any Alpha register or memory 4362 instruction in the trap shadow (live on entry), then no instruction 4363 in the trap shadow may modify the register or memory location. local 4365 (b) Within the trap shadow, the computation of the base register 4370 (c) Within the trap shadow, no register may be used more than once 4374 (d) The trap shadow may not include any branch instructions. */ 4380 struct shadow_summary shadow; 4386 shadow.used.i = 0; 4387 shadow 4487 summarize_insn (PATTERN (i), &shadow, 0); local [all...] |
/haiku-buildtools/gcc/gcc/config/alpha/ |
H A D | alpha.c | 8755 as possible. In this context, a trap shadow is the sequence of 8762 (a) On entry to the trap shadow, if any Alpha register or memory 8764 instruction in the trap shadow (live on entry), then no instruction 8765 in the trap shadow may modify the register or memory location. 8767 (b) Within the trap shadow, the computation of the base register 8772 (c) Within the trap shadow, no register may be used more than once 8776 (d) The trap shadow may not include any branch instructions. */ 8781 struct shadow_summary shadow; 8787 shadow.used.i = 0; 8788 shadow 8760 struct shadow_summary shadow; local 8889 summarize_insn (PATTERN (i), &shadow, 0); local [all...] |
/haiku-buildtools/gcc/gcc/ |
H A D | asan.c | 184 The shadow memory for that stack layout is going to look like this: 186 - content of shadow memory 8 bytes for slot 7: 0xF1F1F1F1. 189 the memory for that shadow byte is part of a the LEFT red zone 192 - content of shadow memory 8 bytes for slots 6 and 5: 195 memory region for this shadow byte is a PARTIAL red zone 200 shadow memory content is 00 means that 8 bytes of its 204 - content of shadow memory 8 bytes for slot 4: 0xF2F2F2F2. 207 region for this shadow byte is a MIDDLE red zone intended to 210 - content of shadow memory 8 bytes for slot 3 and 2: 216 - content of shadow memor 2648 tree shadow = build_shadow_mem_access (&gsi, loc, base_addr, local 2657 tree shadow = build_shadow_mem_access (&gsi, loc, base_addr, local 2704 tree shadow = build_shadow_mem_access (&gsi, loc, base_end_addr, local [all...] |
/haiku-buildtools/gcc/gcc/config/c6x/ |
H A D | c6x.c | 3022 /* Return true iff TYPE is one of the shadow types. */ 3030 /* Return true iff INSN is a shadow pattern. */ 3039 /* Return true iff INSN is a shadow or blockage pattern. */ 3673 /* The last issued insn that isn't a shadow of another. */ 4242 the jump shadow depends so late that its side effect happens 4562 /* A jump shadow needs to have its latency decreased by one. Conceptually, 4575 /* We can get anti-dependencies against shadow insns. Treat these 4696 /* The machine is eight insns wide. We can have up to six shadow 4697 insns, plus an extra slot for merging the jump shadow. */ 4999 is the shadow ins 4982 rtx_insn *shadow = local [all...] |
/haiku-buildtools/legacy/gcc/gcc/cp/ |
H A D | decl.c | 4199 /* Inline decls shadow nothing. */; 4229 /* No shadow warnings for internally generated vars. */ 4231 /* No shadow warnings for vars made for inlining. */ 4245 /* XXX shadow warnings in outer-more namespaces */ 4455 tree shadow; 4479 for (shadow = class_binding_level->class_shadowed; 4480 shadow; 4481 shadow = TREE_CHAIN (shadow)) 4482 if (TREE_PURPOSE (shadow) 4447 tree shadow; local [all...] |